Browse Definitions:
Definition

# law of averages

Contributor(s): Stan Gibilisco

The law of averages is an erroneous generalization of the law of large numbers, which states that the frequencies of events with the same likelihood of occurrence even out, given enough trials or instances. The law of averages is usually mentioned in reference to situations without enough outcomes to bring the law of large numbers into effect.

A common example of how the law of averages can mislead involves the tossing of a fair coin (a coin equally likely to come up heads or tails on any given toss). If someone tosses a fair coin and gets several heads in a row, that person might think that the next toss is more likely to come up tails than heads in order to "even things out." But the true probabilities of the two outcomes are still equal for the next coin toss and any coin toss that might follow. Past results have no effect whatsoever: Each toss is an independent event.

Another example of the law of averages involves batting averages in baseball. If a player has a batting average of .250, then he can be expected to get a hit on one out of every four at-bats (not counting bases on balls) in the long term. However, as anyone who follows baseball knows, hitters' fortunes run in "streaks" and "slumps" that can last for days or even weeks. During a "streak," a batter might get a hit in four out of 10 at-bats, and during "slumps" he might get a hit in only one out of 10 at-bats. If people invoke the law of averages when the hitter is "slumping," they will say that "he is due for a hit," suggesting on each and every at-bat that his chances are better than one in four because things "have to even out." However, according to the strict law of large numbers, no such supposition can be made.

The law of large numbers is often confused with the law of averages, and many texts use the two terms interchangeably. However, the law of averages, strictly defined, is not a law at all, but a logic error that is sometimes referred to as the gambler’s fallacy.

This was last updated in December 2012

#### Start the conversation

Send me notifications when other members comment.

## SearchCompliance

• ### PCAOB (Public Company Accounting Oversight Board)

The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

• ### cyborg anthropologist

A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

• ### RegTech

RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

## SearchSecurity

• ### email spam

Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

• ### distributed denial of service (DDoS) attack

A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

• ### application whitelisting

Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

## SearchHealthIT

• ### athenahealth Inc.

Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

• ### Affordable Care Act (ACA or Obamacare)

The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

• ### HIPAA Privacy Rule

The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

## SearchDisasterRecovery

• ### disaster recovery as a service (DRaaS)

One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

• ### data recovery

Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

• ### disaster recovery plan (DRP)

A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

## SearchStorage

• ### virtual memory

Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

• ### yottabyte (YB)

A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

• ### Kilo, mega, giga, tera, peta, exa, zetta and all that

Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

## SearchSolidStateStorage

• ### PCIe SSD (PCIe solid-state drive)

A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

• ### SSD caching

SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

• ### NVDIMM (Non-Volatile Dual In-line Memory Module)

An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

## SearchCloudStorage

• ### RESTful API

A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

• ### cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

• ### Zadara VPSA and ZIOS

Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close